Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

  • Chromium 37 Launches With Major Security Fixes, 64-bit Windows Support

    An anonymous reader writes Google has released Chrome/Chromium version 37 for Windows, Mac, and Linux. Among the changes are better-looking fonts on Windows and a revamped password manager. There are 50 security fixes, including several to patch a sandbox escaping vulnerability. The release also brings stable 64-bit Windows support which ...offers many benefits for speed, stability and security. Our measurements have shown that the native 64-bit version of Chrome has improved speed on many of our graphics and media benchmarks. For example, the VP9 codec that’s used in High Definition YouTube videos shows a 15% improvement in decoding performance. Stability measurements from people opted into our Canary, Dev and Beta 64-bit channels confirm that 64-bit rendering engines are almost twice as stable as 32-bit engines when handling typical web content. Finally, on 64-bit, our defense in depth security mitigations such as Partition Alloc are able to far more effectively defend against vulnerabilities that rely on controlling the memory layout of objects. The full changelog.

    75 comments | 3 hours ago

  • MediaGoblin 0.7.0 "Time Traveler's Delight" Released

    paroneayea (642895) writes "The GNU MediaGoblin folks have put out another release of their free software media hosting platform, dubbed 0.7.0: Time Traveler's Delight. The new release moves closer to federation by including a new upload API based on the Pump API, a new theme labeled "Sandy 70s Speedboat", metadata features, bulk upload, a more responsive design, and many other fixes and improvements. This is the first release since the recent crowdfunding campaign run with the FSF which was used to bring on a full time developer to focus on federation, among other things."

    64 comments | yesterday

  • Munich Council Say Talk of LiMux Demise Is Greatly Exaggerated

    ndogg (158021) writes "The rumors of Munich's city government going back to Microsoft seem to have been greatly exaggerated. There was a review of the city's IT systems that was called for by the mayor, but it wasn't solely just to decide on whether to move back to Microsoft. And while there have been complaints about LiMux, they mostly seem to concern compatibility with OpenOffice.org, which may well be resolved by switching to LibreOffice."

    187 comments | 2 days ago

  • If Java Wasn't Cool 10 Years Ago, What About Now?

    10 years ago today on this site, readers answered the question "Why is Java considered un-cool?" 10 years later, Java might not be hip, but it's certainly stuck around. (For slightly more than 10 years, it's been the basis of the Advanced Placement test for computer science, too, which means that lots of American students are exposed to Java as their first formally taught language.) And for most of that time, it's been (almost entirely) Free, open source software, despite some grumbling from Oracle. How do you see Java in 2014? Are the pessimists right?

    493 comments | 2 days ago

  • A New Homegrown OS For China Could Arrive By October

    According to a Reuters report, China could have a new homegrown operating system by October to take on imported rivals such as Microsoft Corp, Google Inc and Apple Inc, Xinhua news agency said on Sunday. Computer technology became an area of tension between China and the United States after a number of run-ins over cyber security. China is now looking to help its domestic industry catch up with imported systems such as Microsoft's Windows and Google's mobile operating system Android. The operating system would first appear on desktop devices and later extend to smartphone and other mobile devices, Xinhua said, citing Ni Guangnan who heads an official OS development alliance established in March. It would make sense for even a "homegrown" operating system to be based on existing ones, in the way Red Flag Linux is. Conceptually related: Earlier this year, Chinese company Coship Electronics announced (and demonstrated) a mobile OS called 960 OS.

    93 comments | 3 days ago

  • Among Gamers, Adult Women Vastly Outnumber Teenage Boys

    MojoKid writes: The Entertainment Software Association has just released its 2014 report on the state of the video game industry (PDF), and as the title of this post suggests, there have been some significant shifts since the last report. Let's tackle the most interesting one first: Females have become the dominant gamer, claiming 52% of the pie. That's impressive, but perhaps more so is the fact that women over the age of 18 represent 36% of the game-playing population, whereas boys aged 18 and under claim a mere 17%. Statistics like these challenge the definition of "gamer." Some might say that it's a stretch to call someone who only plays mobile games a "gamer" (Candy Crush anyone?). Mental hurdle aside, the reality is that anyone who plays games, regardless of the platform, is a gamer.

    273 comments | 3 days ago

  • The Making of the Making of Nihilumbra

    SlappingOysters (1344355) writes "Digital magazine outlet Grab It has been pushing the boundaries of what can be achieved with media on touchscreens, which includes an experimental special edition of its publication focused on indie platformer Nihilumbra from BeautiFun Games. In this blog entry, the editor talks about how the digital format can be used to create reading experiences that you physically play just like it is the game. The app is available on iPad, but the article itself is an intriguing read for those wondering where the future of digital magazines can head."

    16 comments | 3 days ago

  • Oregon Sues Oracle For "Abysmal" Healthcare Website

    SpzToid (869795) writes The state of Oregon sued Oracle America Inc. and six of its top executives Friday, accusing the software giant of fraud for failing to deliver a working website for the Affordable Care Act program. The 126-page lawsuit claims Oracle has committed fraud, lies, and "a pattern of activity that has cost the State and Cover Oregon hundreds of millions of dollars". "Not only were Oracle's claims lies, Oracle's work was abysmal", the lawsuit said. Oregon paid Oracle about $240.3 million for a system that never worked, the suit said. "Today's lawsuit clearly explains how egregiously Oracle has disserved Oregonians and our state agencies", said Oregon Atty. Gen. Ellen Rosenblum in a written statement. "Over the course of our investigation, it became abundantly clear that Oracle repeatedly lied and defrauded the state. Through this legal action, we intend to make our state whole and make sure taxpayers aren't left holding the bag."

    Oregon's suit alleges that Oracle, the largest tech contractor working on the website, falsely convinced officials to buy "hundreds of millions of dollars of Oracle products and services that failed to perform as promised." It is seeking $200 million in damages. Oracle issued a statement saying the suit "is a desperate attempt to deflect blame from Cover Oregon and the governor for their failures to manage a complex IT project. The complaint is a fictional account of the Oregon Healthcare Project."

    210 comments | 4 days ago

  • Google Wants To Test Driverless Cars In a Simulation

    An anonymous reader writes Google has been testing its autonomous vehicles on U.S. roads for a while now. In fact, they're required to, by law. "California's regulations stipulate autonomous vehicles must be tested under "controlled conditions" that mimic real-world driving as closely as possible. Usually, that has meant a private test track or temporarily closed public road." It's easy enough to test a few prototypes, but whenever autonomous cars start being produced by manufacturers, it'll become a lot more complicated. Now, Google is lobbying to change that law to allow testing via computer simulation. Safety director Ron Medford said, "Computer simulations are actually more valuable, as they allow manufacturers to test their software under far more conditions and stresses than could possibly be achieved on a test track." Google spokeswoman Katelin Jabbari said, "In a few hours, we can test thousands upon thousands of scenarios which in terms of driving all over again might take decades." Shee adds that simulator data can also easily provide information on how human behavior creeps into driving. "It's not just about the physics of avoiding a crash. It's also about the emotional expectation of passengers and other drivers." For example, when one of Google's computer-controlled cars is cut off, the software brakes harder than it needs to, because this makes the passengers feel safer. Critics say relying heavily on simulation data is flawed because it doesn't take into account how other cars react to the computer's driving.

    172 comments | 4 days ago

  • Researchers Hack Gmail With 92 Percent Success Rate

    SternisheFan sends this report from CNET: Researchers at the University of California Riverside Bourns College of Engineering and the University of Michigan have identified a weakness they believe to exist across Android, Windows, and iOS operating systems that could allow malicious apps to obtain personal information. Although it was tested only on an Android phone, the team believes that the method could be used across all three operating systems because all three share a similar feature: all apps can access a mobile device's shared memory. "The assumption has always been that these apps can't interfere with each other easily," said Zhiyun Qian, an associate professor at UC Riverside. "We show that assumption is not correct and one app can in fact significantly impact another and result in harmful consequences for the user." To demonstrate the method of attack, first a user must download an app that appears benign, such as a wallpaper, but actually contains malicious code. Once installed, the researchers can use it to access the shared memory statistics of any process (PDF), which doesn't require any special privileges.

    87 comments | 4 days ago

  • Apple CarPlay Rollout Delayed By Some Carmakers

    Lucas123 writes: Some car makers are delaying the implementation of Apple's CarPlay iPhone interface for vehicle infotainment systems. The delays, which are prompting manufacturers such as Mercedes, Volvo and Honda to push their announcement from 2014 to 2015, appear to be related to a few snags in the integration process or in choosing which model cars should have the middleware. At the same time, many of the automakers rolling out CarPlay are also implementing Android Auto, which will provide a vehicle head unit user interface for Android smartphones. Analysts believe the addition of Android Auto earlier this year may also be causing delays because manufacturers want to be able to announce availability of both platforms in their new model vehicles.

    75 comments | 4 days ago

  • What's After Big Data?

    gthuang88 writes: As the marketing hype around "big data" subsides, a recent wave of startups is solving a new class of data-related problems and showing where the field is headed. Niche analytics companies like RStudio, Vast, and FarmLink are trying to provide insights for specific industries such as finance, real estate, and agriculture. Data-wrangling software from startups like Tamr and Trifacta is targeting enterprises looking to find and prep corporate data. And heavily funded startups such as Actifio and DataGravity are trying to make data-storage systems smarter. Together, these efforts highlight where emerging data technologies might actually be used in the business world.

    87 comments | 5 days ago

  • Researchers Made a Fake Social Network To Infiltrate China's Internet Censors

    Jason Koebler writes: In order to get inside China's notorious internet filter, Harvard researcher Gary King created his own fake social network to gain access to the programs used to censor content, so he could reverse-engineer the system. "From inside China, we created our own social media website, purchased a URL, rented server space, contracted with one of the most popular software platforms in China used to create these sites, submitted, automatically reviewed, posted, and censored our own submissions," King wrote in a study published in Science. "We had complete access to the software; we were even able to get their recommendations on how to conduct censorship on our own site in compliance with government standards."

    49 comments | 5 days ago

  • NSA Agents Leak Tor Bugs To Developers

    An anonymous reader writes: We've known for a while that NSA specifically targets Tor, because they want to disrupt one of the last remaining communication methods they aren't able to tap or demand access to. However, not everybody at the NSA is on board with this strategy. Tor developer Andrew Lewman says even as flaws in Tor are rooted out by the NSA and British counterpart GCHQ, other agents from the two organizations leak those flaws directly to the developers, so they can be fixed quickly. He said, "You have to think about the type of people who would be able to do this and have the expertise and time to read Tor source code from scratch for hours, for weeks, for months, and find and elucidate these super-subtle bugs or other things that they probably don't get to see in most commercial software." Lewman estimates the Tor Project receives these reports on a monthly basis. He also spoke about how a growing amount of users will affect Tor. He suggests a massive company like Google or Facebook will eventually have to take up the task of making Tor scale up to millions of users.

    116 comments | 5 days ago

  • Latest Wikipedia Uproar Over 'Superprotection'

    metasonix writes: As if the problems brought up during the recent 2014 Wikimania conference weren't enough, now Wikipedia is having an outright battle between its editor and administrator communities, especially on the German-language Wikipedia. The Wikimedia Foundation, currently flush with cash from its donors, keeps trying to force flawed new software systems onto the editor community, who has repeatedly responded by disabling the software. This time, however, Foundation Deputy Director Erik Moeller had the bright idea to create a new level of page protection to prevent the new software from being disabled. "Superprotection" has resulted in an outright revolt on the German Wikipedia. There has been subsequent coverage in the German press, and people have issued demands that Moeller, one of Wikipedia's oldest insiders, be removed from his job. One English Wikipedia insider started a change.org petition demanding the removal of superprotection."

    239 comments | 5 days ago

  • Future Hack: New Cybersecurity Tool Predicts Breaches Before They Happen

    An anonymous reader writes: A new research paper (PDF) outlines security software that scans and scrapes web sites (past and present) to identify patterms leading up to a security breach. It then accurately predicts what websites will be hacked in the future. The tool has an accuracy of up to 66%. Quoting: "The algorithm is designed to automatically detect whether a Web server is likely to become malicious in the future by analyzing a wide array of the site's characteristics: For example, what software does the server run? What keywords are present? How are the Web pages structured? If your website has a whole lot in common with another website that ended up hacked, the classifier will predict a gloomy future. The classifier itself always updates and evolves, the researchers wrote. It can 'quickly adapt to emerging threats.'"

    33 comments | 5 days ago

  • Microsoft Lobby Denies the State of Chile Access To Free Software

    walterbyrd writes: Fresh on the heels of the entire Munich and Linux debacle, another story involving Microsoft and free software has popped up across the world, in Chile. A prolific magazine from the South American country says that the powerful Microsoft lobby managed to turn around a law that would allow the authorities to use free software. "An independent member of the Chilean Parliament, Vlado Mirosevic, pushed a bill that would allow the state to consider free software when the authorities needed to purchase or renew licenses. ... A while later, the same member of the Parliament, Daniel Farcas, proposed another bill that actually nullified the effects of the previous one that had just been adopted. To make things even more interesting, some of the people who voted in favor of the first law also voted in favor of the second one. ... The new bill is even more egregious, because it aggressively pushes for the adoption of proprietary software. Companies that choose to use proprietary software will receive certain tax breaks, which makes it very hard for free software to get adopted."

    159 comments | 5 days ago

  • Book Review: Social Engineering In IT Security Tools, Tactics, and Techniques

    benrothke writes When I got a copy of Social Engineering in IT Security Tools, Tactics, and Techniques by Sharon Conheady, my first thought was that it likely could not have much that Christopher Hadnagy didn't already detail in the definitive text on the topic: Social Engineering: The Art of Human Hacking. Obviously Hadnagy thought differently, as he wrote the forward to the book; which he found to be a valuable resource. While there is overlap between the two books; Hadnagy's book takes a somewhat more aggressive tool-based approach, while Conheady take a somewhat more passive, purely social approach to the topic. There are many more software tools in Hadnagy; while Conheady doesn't reference software tools until nearly half-way through the book. This book provides an extensive introduction to the topic and details how social engineering has evolved through the centuries. Conheady writes how the overall tactics and goals have stayed the same; while the tools and techniques have been modified to suit the times. Keep reading for the rest of Ben's review.

    45 comments | 5 days ago

  • Interviews: Andrew "bunnie" Huang Answers Your Questions

    A while ago you had a chance to ask Andrew "bunnie" Huang about hardware, hacking and his open source hardware laptop Novena. Below you'll find his answers to those questions.

    32 comments | about a week ago

  • Study: Ad-Free Internet Would Cost Everyone $230-a-Year

    Several readers sent word of research into the cost of internet content without ads. They looked at the amount of money spent on internet advertising last year in the U.K., and compared it to the number of U.K. internet users. On average, each user would have to pay about £140 ($230) to make up for the lost revenue of an ad-free internet. In a survey, 98% of consumers said they wouldn't be willing to pay that much for the ability to browse without advertisements. However, while most consumers regard ads as a necessary trade-off to keep the internet free, they will go to great lengths to avoid advertising they do not wish to see. Of those surveyed, 63 per cent said they skip online video ads 'as quickly as possible' – a figure that rises to 75 per cent for 16-24 year olds. Over a quarter of all respondents said they mute their sound and one in five scroll away from the video. 16 per cent use ad blocking software and 16 per cent open a new browser window or tab.

    609 comments | about a week ago

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>